{"dataType": "CVE_RECORD", "containers": {"adp": [{"metrics": [{"other": {"type": "Unknown", "content": {"data": "{\"description\":\"unimportant\"}"}}}], "affected": [{"vendor": "debian", "product": "sudo", "platforms": ["bookworm", "bullseye"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libnss-sudo", "versions": [{"status": "affected", "version": "0", "lessThan": "1.9.16p2-3", "versionType": "deb"}], "platforms": ["forky", "sid", "trixie"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "sudo", "versions": [{"status": "affected", "version": "0", "lessThan": "1.9.16p2-3", "versionType": "deb"}], "platforms": ["forky", "sid", "trixie"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "sudo-dbgsym", "versions": [{"status": "affected", "version": "0", "lessThan": "1.9.16p2-3", "versionType": "deb"}], "platforms": ["forky", "sid", "trixie"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "sudo-ldap", "versions": [{"status": "affected", "version": "0", "lessThan": "1.9.16p2-3", "versionType": "deb"}], "platforms": ["forky", "sid", "trixie"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "sudo-ldap-dbgsym", "versions": [{"status": "affected", "version": "0", "lessThan": "1.9.16p2-3", "versionType": "deb"}], "platforms": ["forky", "sid", "trixie"], "defaultStatus": "unaffected"}], "references": [{"url": "https://security-tracker.debian.org/tracker/CVE-2025-32463"}], "descriptions": [{"lang": "en", "value": "Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option."}], "providerMetadata": {"orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian", "dateUpdated": "2025-06-30T00:00:00.000Z", "x_subShortName": "debian"}}, {"credits": [{"lang": "en", "value": "packager@almalinux.org"}], "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Important\"}"}}}], "affected": [{"vendor": "almalinux", "product": "sudo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15-8.p5.el10_0.2", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:10"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "sudo-python-plugin", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15-8.p5.el10_0.2", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:10"], "defaultStatus": "unaffected"}], "references": [{"url": "https://access.redhat.com/security/cve/CVE-2025-32463", "name": "CVE-2025-32463"}], "descriptions": [{"lang": "en", "value": "The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root.  \n\nSecurity Fix(es):  \n\n  * sudo: LPE via host option (CVE-2025-32462)\n  * sudo: LPE via chroot option (CVE-2025-32463)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n"}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000001", "shortName": "almalinux", "dateUpdated": "2025-07-22T00:00:00Z", "x_subShortName": "alma_10"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"IMPORTANT\"}"}}}], "affected": [{"vendor": "oraclelinux", "product": "sudo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15-8.p5.el10_0.2", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:10"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "sudo-python-plugin", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15-8.p5.el10_0.2", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:10"], "defaultStatus": "unaffected"}], "references": [{"url": "https://linux.oracle.com/cve/CVE-2025-32463.html"}], "descriptions": [{"lang": "en", "value": "Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option."}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000006", "shortName": "oraclelinux", "dateUpdated": "2025-07-22T00:00:00Z", "x_subShortName": "oraclelinux"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Important\"}"}}}], "affected": [{"vendor": "redhat", "product": "sudo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15-8.p5.el10_0.2", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:10"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "sudo-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15-8.p5.el10_0.2", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:10"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "sudo-debugsource", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15-8.p5.el10_0.2", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:10"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "sudo-python-plugin", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15-8.p5.el10_0.2", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:10"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "sudo-python-plugin-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15-8.p5.el10_0.2", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:10"], "defaultStatus": "unaffected"}], "references": [{"url": "https://access.redhat.com/security/cve/CVE-2025-32463"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374693"}, {"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32463"}, {"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"}, {"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"}, {"url": "https://www.stratascale.com/resource/cve-2025-32463-sudo-chroot-elevation-of-privilege/"}, {"url": "https://www.sudo.ws/security/advisories/chroot_bug/"}], "descriptions": [{"lang": "en", "value": "A flaw was found in Sudo. This flaw allows a local attacker to escalate their privileges by tricking Sudo into loading an arbitrary shared library using the user-specified root directory via the `-R` (`--chroot`) option. An attacker can run arbitrary commands as root on systems that support `/etc/nsswitch.conf`."}], "providerMetadata": {"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", "dateUpdated": "2025-06-30T14:00:00Z", "x_subShortName": "redhat_10"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Important\"}"}}}], "affected": [{"vendor": "redhat", "product": "sudo", "platforms": ["cpe:/o:redhat:enterprise_linux:6"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "sudo-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:6"], "defaultStatus": "unaffected"}], "references": [{"url": "https://access.redhat.com/security/cve/CVE-2025-32463"}], "descriptions": [{"lang": "en", "value": "Red Hat's versions of the associated software have been determined to NOT be affected by CVE-2025-32463."}], "providerMetadata": {"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", "dateUpdated": "2025-06-30T14:00:00Z", "x_subShortName": "redhat_6"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Important\"}"}}}], "affected": [{"vendor": "redhat", "product": "sudo", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "sudo-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "unaffected"}], "references": [{"url": "https://access.redhat.com/security/cve/CVE-2025-32463"}], "descriptions": [{"lang": "en", "value": "Red Hat's versions of the associated software have been determined to NOT be affected by CVE-2025-32463."}], "providerMetadata": {"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", "dateUpdated": "2025-06-30T14:00:00Z", "x_subShortName": "redhat_7"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Important\"}"}}}], "affected": [{"vendor": "redhat", "product": "sudo", "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}], "references": [{"url": "https://access.redhat.com/security/cve/CVE-2025-32463"}], "descriptions": [{"lang": "en", "value": "Red Hat's versions of the associated software have been determined to NOT be affected by CVE-2025-32463."}], "providerMetadata": {"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", "dateUpdated": "2025-06-30T14:00:00Z", "x_subShortName": "redhat_8"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Important\"}"}}}], "affected": [{"vendor": "redhat", "product": "sudo", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "sudo-python-plugin", "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}], "references": [{"url": "https://access.redhat.com/security/cve/CVE-2025-32463"}], "descriptions": [{"lang": "en", "value": "Red Hat's versions of the associated software have been determined to NOT be affected by CVE-2025-32463."}], "providerMetadata": {"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", "dateUpdated": "2025-06-30T14:00:00Z", "x_subShortName": "redhat_9"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Important\"}"}}}], "affected": [{"vendor": "rocky", "product": "sudo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15-8.p5.el10_0.2", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:10"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "sudo-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15-8.p5.el10_0.2", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:10"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "sudo-debugsource", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15-8.p5.el10_0.2", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:10"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "sudo-python-plugin", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15-8.p5.el10_0.2", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:10"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "sudo-python-plugin-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15-8.p5.el10_0.2", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:10"], "defaultStatus": "unaffected"}], "references": [{"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374692"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374693"}], "descriptions": [{"lang": "en", "value": "sudo: LPE via chroot option (CVE-2025-32463)"}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000004", "shortName": "rocky", "dateUpdated": "2025-10-03T19:56:45Z", "x_subShortName": "rocky"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Important\"}"}}}], "affected": [{"vendor": "suse", "product": "sudo", "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sles-ltss:15", "cpe:/o:suse:sles-ltss:15:sp1", "cpe:/o:suse:sles-ltss:15:sp2", "cpe:/o:suse:sles-ltss:15:sp3", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_sap:15:sp5"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "sudo-devel", "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sles-ltss:15", "cpe:/o:suse:sles-ltss:15:sp1", "cpe:/o:suse:sles-ltss:15:sp2", "cpe:/o:suse:sles-ltss:15:sp3", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_sap:15:sp5"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "sudo-plugin-python", "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sles-ltss:15:sp3", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_sap:15:sp5"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "sudo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15p5-150600.3.9.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "sudo-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15p5-150600.3.9.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "sudo-plugin-python", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15p5-150600.3.9.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "sudo-policy-sudo-auth-self", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15p5-150600.3.9.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "sudo-policy-wheel-auth-self", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15p5-150600.3.9.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "system-group-sudo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15p5-150600.3.9.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}], "solutions": [{"lang": "en", "value": "SUSE bug 1245275"}], "references": [{"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32463", "name": "Mitre CVE-2025-32463"}, {"url": "https://www.suse.com/security/cve/CVE-2025-32463", "name": "SUSE CVE-2025-32463"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-June/040568.html", "name": "SUSE-SU-2025:02177-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040852.html", "name": "SUSE-SU-2025:20478-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040932.html", "name": "SUSE-SU-2025:20489-1"}], "descriptions": [{"lang": "en", "value": "\n    Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.\n    "}], "providerMetadata": {"orgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb", "shortName": "suse", "dateUpdated": "2025-07-01T00:00:00Z", "x_subShortName": "suse_server_15"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Important\"}"}}}], "affected": [{"vendor": "suse", "product": "sudo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15p5-150600.3.9.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "sudo-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15p5-150600.3.9.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "sudo-plugin-python", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15p5-150600.3.9.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "sudo-policy-sudo-auth-self", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15p5-150600.3.9.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "sudo-policy-wheel-auth-self", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15p5-150600.3.9.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "system-group-sudo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15p5-150600.3.9.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}], "solutions": [{"lang": "en", "value": "SUSE bug 1245275"}], "references": [{"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32463", "name": "Mitre CVE-2025-32463"}, {"url": "https://www.suse.com/security/cve/CVE-2025-32463", "name": "SUSE CVE-2025-32463"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-June/040568.html", "name": "SUSE-SU-2025:02177-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040852.html", "name": "SUSE-SU-2025:20478-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040932.html", "name": "SUSE-SU-2025:20489-1"}], "descriptions": [{"lang": "en", "value": "\n    Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.\n    "}], "providerMetadata": {"orgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb", "shortName": "suse", "dateUpdated": "2025-07-01T00:00:00Z", "x_subShortName": "suse_desktop_15"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Important\"}"}}}], "affected": [{"vendor": "suse", "product": "sudo", "platforms": ["cpe:/o:suse:sles:12:sp2", "cpe:/o:suse:sles:12:sp4", "cpe:/o:suse:sles:12:sp5"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "sudo-devel", "platforms": ["cpe:/o:suse:sles:12:sp5"], "defaultStatus": "unaffected"}], "solutions": [{"lang": "en", "value": "SUSE bug 1245275"}], "references": [{"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32463", "name": "Mitre CVE-2025-32463"}, {"url": "https://www.suse.com/security/cve/CVE-2025-32463", "name": "SUSE CVE-2025-32463"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-June/040568.html", "name": "SUSE-SU-2025:02177-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040852.html", "name": "SUSE-SU-2025:20478-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040932.html", "name": "SUSE-SU-2025:20489-1"}], "descriptions": [{"lang": "en", "value": "\n    Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.\n    "}], "providerMetadata": {"orgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb", "shortName": "suse", "dateUpdated": "2025-07-01T00:00:00Z", "x_subShortName": "suse_server_12"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Important\"}"}}}], "affected": [{"vendor": "suse", "product": "sudo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.17p1-160000.2.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "sudo-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.17p1-160000.2.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "sudo-plugin-python", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.17p1-160000.2.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "sudo-policy-sudo-auth-self", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.17p1-160000.2.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "sudo-policy-wheel-auth-self", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.17p1-160000.2.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "system-group-sudo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.17p1-160000.2.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}], "solutions": [{"lang": "en", "value": "SUSE bug 1245275"}], "references": [{"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32463", "name": "Mitre CVE-2025-32463"}, {"url": "https://www.suse.com/security/cve/CVE-2025-32463", "name": "SUSE CVE-2025-32463"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-June/040568.html", "name": "SUSE-SU-2025:02177-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040852.html", "name": "SUSE-SU-2025:20478-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040932.html", "name": "SUSE-SU-2025:20489-1"}], "descriptions": [{"lang": "en", "value": "\n    Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.\n    "}], "providerMetadata": {"orgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb", "shortName": "suse", "dateUpdated": "2025-11-14T00:00:00Z", "x_subShortName": "suse_server_16"}}, {"metrics": [{"cvssV3_1": {"scope": "CHANGED", "version": "3.1", "baseScore": 9.3, "attackVector": "LOCAL", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"high\"}"}}}], "affected": [{"vendor": "canonical", "product": "libnss-sudo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15p5-3ubuntu5.24.04.1", "versionType": "custom"}], "platforms": ["noble"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "sudo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15p5-3ubuntu5.24.04.1", "versionType": "custom"}], "platforms": ["noble"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "sudo-ldap", "versions": [{"status": "affected", "version": "0", "lessThan": "0:1.9.15p5-3ubuntu5.24.04.1", "versionType": "custom"}], "platforms": ["noble"], "defaultStatus": "unaffected"}], "references": [{"url": "https://ubuntu.com/security/CVE-2025-32463"}, {"url": "https://ubuntu.com/security/notices/USN-7604-1"}, {"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"}], "descriptions": [{"lang": "en", "value": "Sudo before 1.9.17p1 allows local users to obtain root access because/etc/nsswitch.conf from a user-controlled directory is used with the--chroot option."}], "providerMetadata": {"orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical", "dateUpdated": "2025-06-30T16:00:00Z", "x_subShortName": "canonical"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}], "affected": [{"vendor": "amazon", "product": "sudo", "versions": [{"status": "affected", "version": "0", "lessThan": "1.9.15-1.p5.amzn2023.0.2", "versionType": "rpm"}], "defaultStatus": "unaffected"}, {"vendor": "amazon", "product": "sudo-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "1.9.15-1.p5.amzn2023.0.2", "versionType": "rpm"}], "defaultStatus": "unaffected"}, {"vendor": "amazon", "product": "sudo-debugsource", "versions": [{"status": "affected", "version": "0", "lessThan": "1.9.15-1.p5.amzn2023.0.2", "versionType": "rpm"}], "defaultStatus": "unaffected"}, {"vendor": "amazon", "product": "sudo-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "1.9.15-1.p5.amzn2023.0.2", "versionType": "rpm"}], "defaultStatus": "unaffected"}, {"vendor": "amazon", "product": "sudo-logsrvd", "versions": [{"status": "affected", "version": "0", "lessThan": "1.9.15-1.p5.amzn2023.0.2", "versionType": "rpm"}], "defaultStatus": "unaffected"}, {"vendor": "amazon", "product": "sudo-logsrvd-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "1.9.15-1.p5.amzn2023.0.2", "versionType": "rpm"}], "defaultStatus": "unaffected"}, {"vendor": "amazon", "product": "sudo-python-plugin", "versions": [{"status": "affected", "version": "0", "lessThan": "1.9.15-1.p5.amzn2023.0.2", "versionType": "rpm"}], "defaultStatus": "unaffected"}, {"vendor": "amazon", "product": "sudo-python-plugin-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "1.9.15-1.p5.amzn2023.0.2", "versionType": "rpm"}], "defaultStatus": "unaffected"}], "references": [{"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32463"}], "descriptions": [{"lang": "en", "value": "Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option."}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000000", "shortName": "alas", "dateUpdated": "2025-07-03T20:38:00Z", "x_subShortName": "alas_2023"}}], "cna": {"metrics": [{"format": "CVSS", "cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"format": "CVSS", "cvssV3_1": {"scope": "CHANGED", "version": "3.1", "baseScore": 9.3, "attackVector": "LOCAL", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}], "affected": [{"cpes": ["cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*", "cpe:2.3:a:sudo_project:sudo:1.9.17:-:*:*:*:*:*:*"], "vendor": "sudo_project", "product": "sudo", "versions": [{"status": "affected", "version": "1.9.14", "lessThan": "1.9.17", "versionType": "custom"}, {"status": "affected", "version": "1.9.17"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:24.10:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:25.04:*:*:*:-:*:*:*"], "vendor": "canonical", "product": "ubuntu_linux", "versions": [{"status": "affected", "version": "22.04"}, {"status": "affected", "version": "24.04"}, {"status": "affected", "version": "24.10"}, {"status": "affected", "version": "25.04"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*"], "vendor": "debian", "product": "debian_linux", "versions": [{"status": "affected", "version": "11.0"}, {"status": "affected", "version": "12.0"}, {"status": "affected", "version": "13.0"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:opensuse:leap:15.6:*:*:*:*:*:*:*"], "vendor": "opensuse", "product": "leap", "versions": [{"status": "affected", "version": "15.6"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "enterprise_linux", "versions": [{"status": "affected", "version": "10.0"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:suse:linux_enterprise_desktop:15:sp6:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_desktop:15:sp7:*:*:*:*:*:*"], "vendor": "suse", "product": "linux_enterprise_desktop", "versions": [{"status": "affected", "version": "15"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp2:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp6:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_real_time:15.0:sp7:*:*:*:*:*:*"], "vendor": "suse", "product": "linux_enterprise_real_time", "versions": [{"status": "affected", "version": "15.0"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp6:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server_for_sap:12:sp7:*:*:*:*:*:*"], "vendor": "suse", "product": "linux_enterprise_server_for_sap", "versions": [{"status": "affected", "version": "12"}], "defaultStatus": "unaffected"}], "references": [{"url": "https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/", "tags": ["exploit", "third-party-advisory"]}, {"url": "https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot", "tags": ["exploit", "third-party-advisory"]}, {"url": "https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32463", "tags": ["issue-tracking", "third-party-advisory"]}, {"url": "https://www.vicarius.io/vsociety/posts/cve-2025-32463-mitigate-sudo-vulnerability", "tags": ["mitigation", "third-party-advisory"]}, {"url": "https://www.sudo.ws/releases/changelog/", "tags": ["release-notes"]}, {"url": "https://access.redhat.com/security/cve/cve-2025-32463", "tags": ["third-party-advisory"]}, {"url": "https://explore.alas.aws.amazon.com/CVE-2025-32463.html", "tags": ["third-party-advisory"]}, {"url": "https://iototsecnews.jp/2025/07/01/linux-sudo-chroot-vulnerability-enables-hackers-to-elevate-privileges-to-root/", "tags": ["third-party-advisory"]}, {"url": "https://security-tracker.debian.org/tracker/CVE-2025-32463", "tags": ["third-party-advisory"]}, {"url": "https://ubuntu.com/security/notices/USN-7604-1", "tags": ["third-party-advisory"]}, {"url": "https://www.openwall.com/lists/oss-security/2025/06/30/3", "tags": ["third-party-advisory"]}, {"url": "https://www.suse.com/security/cve/CVE-2025-32463.html", "tags": ["third-party-advisory"]}, {"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502177-1/", "tags": ["third-party-advisory"]}, {"url": "https://www.vicarius.io/vsociety/posts/cve-2025-32463-detect-sudo-vulnerability", "tags": ["third-party-advisory"]}, {"url": "https://www.sudo.ws/security/advisories/", "tags": ["vendor-advisory"]}, {"url": "https://www.sudo.ws/security/advisories/chroot_bug/", "tags": ["vendor-advisory"]}, {"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32463", "tags": ["x_us-government-resource"]}], "descriptions": [{"lang": "en", "value": "Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option."}, {"lang": "es", "value": "Sudo anterior a 1.9.17p1 permite a los usuarios locales obtener acceso root porque /etc/nsswitch.conf desde un directorio controlado por el usuario se utiliza con la opción --chroot."}], "problemTypes": [{"descriptions": [{"lang": "en", "cweId": "CWE-829", "description": "CWE-829"}]}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000003", "shortName": "nvd", "dateUpdated": "2025-06-30T21:15:30Z", "x_subShortName": "nvd"}}}, "cveMetadata": {"cveId": "CVE-2025-32463", "state": "PUBLISHED", "dateUpdated": "2025-11-05T19:26:48Z", "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "datePublished": "2025-06-30T21:15:30Z", "assignerShortName": "mitre"}, "dataVersion": "5.0"}